DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Two apps with health info found leaking: researcher. Part 2: Hzone

Posted on December 14, 2015 by Dissent

This is Part 2 of today’s posts reporting on apps leaking health information. The leaks were shared with DataBreaches.net by researcher Chris Vickery, and this one involves  very sensitive health and medical information. Part 1 reported on iFit’s data leak. 

hzone

Screenshots provided to DataBreaches.net on December 8 by Vickery revealed that 4,926 user accounts from Hzone Dating App for HIV-positive Singles  were leaking. The personal information included date of birth, religion, relationship status, country,  email address, ethnicity, height, last login IP address, username, orientation, number of children, and password hash. Users can also enter their nicknames, share their political views and sexual life experiences, and post their photo in their profile, as this redacted screencap illustrates:

app2

The database also stores messages posted by members. The messages often contain very personal or sensitive information, e.g.,

“Hi. I was diagnosed 3 years ago now. CD4 and Viral Load is relatively good. I’m therefore not on Meds yet. My 6-monthly blood tests are due in June. Planning to go in meds. I’m worried about the side effects. What kinds of side effect have you experienced? Xx”,

While Hzone is a free app, if  people subscribe to the premium service, they also provide their name, postal address, phone numbers, and credit card information.

In other words, it’s a leak that could lead to identity theft, extortion demands, or embarrassment.

Five days after multiple initial notifications by this site and Chris Vickery, Hzone’s user information was still leaking.

Indeed, their correspondence, when they finally responded five days after I notified them, was somewhat bizarre, to say the least, and replete with all kinds of accusations.

Because sensitive information was leaking and Hzone was not responding, DataBreaches.net filed an FTC complaint on December 9 and urged them to use their resources to contact the developer to get them to secure their database. FTC did not respond to that request. Apple’s iTune App Store did respond, however, when this site contacted them on December 12 with my concerns when the database continued to leak. Their response did not include immediately pulling the app from the store, however, and days later, they were still reportedly investigating.

As of December 13, 5,027 users’ information was leaking – 100 more people were now at risk than when I first notified Hzone of its leaking database.

The database was (finally) secured last night.

Unfortunately for its users, Hzone does not have a strong tech team, as their spokesperson admitted to DataBreaches.net in e-mail. And users who decide that they do not wish to risk exposure from an app that may not have a great grasp of security appear to be SOL  because it seems that Hzone won’t delete profiles. From reviews of Hzone in the iTunes app store:

Hzone_reviews_Tunes

Hzone’s privacy policy makes no mention of deleting accounts or profiles.

As it routinely does, DataBreaches.net asked Hzone when the leak first began, whether they had audited to determine how many others might have accessed the database, whether they would be notifying their users of the leak, etc. They replied that the leak occurred for no more than one week. “We just re-setup a new system with the server and database and the leaking may caused by that,” a spokesperson informed this site.

Their statement appears to be belied by the fact that a search engine accessed their database anonymously on November 29. So the database was already leaking by then and may have been leaking much earlier.

Hzone’s answer to another question also raises question about their honesty or security auditing. When asked how many people or IP addresses may have accessed the leaking database, they replied, “As far as we can see, you are the only one who have accessed our server and database. No other IP or people login.”

Chris Vickery says that’s a lie, as he used more than one computer and IP address to access the database. So if they claim only one IP address accessed the database, did they really even check or did they check and are covering up?  How many other accesses may there have been?

Asked whether Hzone would be notifying its users that their data was exposed, they replied:

No,we didn’t notify them. If you will not publish them out, nobody else would do that, right? And I believe you will not publish them out, right?

So we’ll all just pretend that they didn’t put all their users’ info at risk, right? If they did not properly investigate the leak and/or report their findings honestly, then those sensitive data may have been leaking for quite a while and may have been accessed by others who might misuse the information. 

As a side note, the developer had a second app that was leaking in the same way, SugarD. That database was also secured last night after DataBreaches.notified them that it, too, was leaking.

User Beware

If you know someone who might be using Hzone, you might want to point them to this post. While anyone can have a leak or breach, Hzone’s failure to timely respond to notification, the lack of encryption for stored sensitive data, and their refusal to delete profiles when they have inadequate incident response are truly concerning.

Side Note: Over on Salted Hash, Steve Ragan fills readers in on my correspondence with Hzone and how I was initially threatened with HIV infection if I disclosed the leak. Put your coffee or favorite beverage down before reading it.

Category: Breach IncidentsBusiness SectorCommentaries and AnalysesExposureHealth DataOf Note

Post navigation

← Two apps with health info found leaking: researcher. Part 1: iFit
Despite warnings earlier this year, tens of thousands of databases continue to leak (update1) →

4 thoughts on “Two apps with health info found leaking: researcher. Part 2: Hzone”

  1. Anonymous says:
    December 14, 2015 at 11:58 am

    Not only were you threatened, but your family as well?

    Not sure how it is in the States, but here that is a threat of assault, as a minimum.

    1. Dissent says:
      December 14, 2015 at 1:24 pm

      It’s probably illegal here, too. And if I took it seriously, I might have done something about it. But as I explain in the Privacy Policy on my other site, PogoWasRight.org:

      Please note that I do not scare easily. I have kids, and there’s nothing you can say in email that will even come remotely close to scaring me as much as the day they both got their driver’s licenses.

      🙂

  2. atechdad says:
    December 16, 2015 at 11:49 am

    I send out proactive notifications of breaches all the time. I’d be happy to notify these users that their information may have been compromised if the app admins won’t.

    @atechdad

    1. Dissent says:
      December 16, 2015 at 1:22 pm

      Thanks for the offer, but because health/sensitive info was involved, neither Chris Vickery nor I downloaded the user data. If Hzone doesn’t notify their users, though, I hope tweets and other media sites reporting on the leak will help get the word out. I actually thought of downloading Hzone so I could enter a customer review on App Store to alert people.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Banks Want SEC to Rescind Cyberattack Disclosure Requirements
  • MathWorks, Creator of MATLAB, Confirms Ransomware Attack
  • Russian hospital programmer gets 14 years for leaking soldier data to Ukraine
  • MSCS board renews contract with PowerSchool while suing them
  • Iranian Man Pleaded Guilty to Role in Robbinhood Ransomware
  • Developments surrounding data breach at Dutch police
  • Estonia launches international search for Moroccan citizen wanted over data theft
  • Now it’s Tiffany: Another LVMH luxury brand hit by hackers
  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.